Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion

被引:16
作者
Agrafiotis, Giorgos [1 ]
Makri, Eftychia [1 ]
Flionis, Ioannis [1 ]
Lalas, Antonios [1 ]
Votis, Konstantinos [1 ]
Tzovaras, Dimitrios [1 ]
机构
[1] Informat Technol Inst, Ctr Res & Technol Hellas, Thessaloniki, Greece
来源
PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022 | 2022年
基金
欧盟地平线“2020”;
关键词
neural networks; 5G networks; security; network anomaly detection; intrusion detection; ids2017; convolutional neural networks; vision transformer;
D O I
10.1145/3538969.3544473
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traffic categorization is considered of paramount importance in the network security sector, as well as the first stage in network anomaly detection, or in a network-based intrusion detection system (IDS). This paper introduces an artificial intelligence (AI) network traffic classification pipeline, including the employment of state-of-the-art image-based neural network models, namely Vision Transformers (ViT) and Convolutional Neural Networks (CNN), whereas the primary element of this pipeline is the transformation of raw traffic data into grayscale pictures introducing a properly developed IDS-Vision Toolkit as well. This approach extracts characteristics from network traffic data without requiring domain expertise and could be easily adapted to new network protocols and technologies (i.e. 5G). Furthermore, the proposed method was tested on the CIC-IDS-2017 dataset and compared to a well-known feature extraction strategy on the same dataset. Finally, it surpasses all suggested binary classification algorithms for the CIC-IDS-2017 dataset to the best of our knowledge, paving the path for further exploitation in the 5G domain to successfully address related cybersecurity challenges.
引用
收藏
页数:7
相关论文
共 24 条
[11]  
Fang Jie, 2022, IEEE Transactions on Intelligent Transportation Systems
[12]  
Idika Nwokedi, 2007, A survey of malware detection techniques, V48, P2
[13]  
IXIA Corporation, 2022, Ixia Breakpoint Overview and Specifications
[14]  
Lam J, 2020, Arxiv, DOI arXiv:2003.03474
[15]   Characterization of Tor Traffic using Time based Features [J].
Lashkari, Arash Habibi ;
Gil, Gerard Draper ;
Mamun, Mohammad Saiful Islam ;
Ghorbani, Ali A. .
ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, :253-262
[16]   Deep learning [J].
LeCun, Yann ;
Bengio, Yoshua ;
Hinton, Geoffrey .
NATURE, 2015, 521 (7553) :436-444
[17]   Efficient application identification and the temporal and spatial stability of classification schema [J].
Li, Wei ;
Canini, Marco ;
Moore, Andrew W. ;
Bolla, Raffaele .
COMPUTER NETWORKS, 2009, 53 (06) :790-809
[18]  
McAfee, 2022, McAfee Labs Quarterly Threat Report December 2016
[19]  
Paszke A, 2019, ADV NEUR IN, V32
[20]  
Sen Subhabrata., 2004, WWW